Cargo thieving hackers running sophisticated remote access campaigns, researchers find
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解主要信息。 文章讲的是网络安全研究人员对卡车和物流行业网络犯罪活动的调查。他们发现黑客通过入侵负载板平台,利用恶意软件获取远程控制权限,并使用证书签名服务来绕过安全措施。此外,黑客不仅偷窃货物,还进行金融诈骗,如扫描加密货币钱包和PayPal凭证。研究人员指出,这个行业的安全防护较弱,导致损失严重。 接下来,我需要将这些要点浓缩成一句话,确保不超过100字。要涵盖研究对象、方法、发现以及影响。 可能的结构是:研究人员调查了针对卡车物流行业的网络犯罪活动,发现黑客通过入侵平台获取远程控制,并利用证书签名服务绕过安全措施。此外,他们还进行金融诈骗。该行业因安全防护薄弱而成为主要目标。 现在检查字数是否符合要求,并确保表达清晰简洁。 </think> 网络安全研究人员调查了针对卡车和物流行业的网络犯罪活动,发现黑客通过入侵负载板平台并利用恶意软件获取远程控制权限,甚至使用证书签名服务绕过安全机制。他们不仅偷窃货物,还进行金融诈骗,如扫描加密货币钱包和PayPal凭证。该行业因多为小型企业且安全防护薄弱而成为主要目标,导致损失严重。 2026-4-16 13:35:13 Author: therecord.media(查看原文) 阅读量:20 收藏

Security researchers recently spent a month getting a first-hand look at the activity of cybercriminals targeting the trucking and logistics industry.

The researchers, from cybersecurity firm Proofpoint, previously described how threat actors gain access to companies in the shipping industry to steal cargo and siphon payments — but their new research sought to answer the question of what exactly happens after they get their feet in the door. 

The work sheds light on the growing threat of cyber-enabled cargo theft and its links to organized crime. Losses from cargo theft in North America rose to $6.6 billion in 2025, driven largely by digital attacks, according to the fleet management company Geotab.

“It’s a huge problem beyond just one actor or one country,” said Ole Villadsen, one of the Proofpoint researchers.  

Using a controlled decoy environment, his team intentionally downloaded a malicious payload sent by email to transportation carriers after the cybercriminals had compromised a load board platform, a marketplace where freight brokers and shippers connect to arrange the movement of cargo. 

After getting access, the cybercriminals installed six separate remote access tools, including four ScreenConnect instances, which researchers believe was an attempt to maintain remote control in case any of them were taken down. 

The last downloaded ScreenConnect tool presented a surprise: the use of a script that automatically queried an external certificate signing service. This enabled all installed components to be signed with a certificate that Windows perceived to be trusted. 

“This was a new capability that we were lucky enough to encounter,” said Villadsen. He believes the “signing-as-a-service” tool is an adaptation to recent security efforts by ScreenConnect to revoke existing certificates and require new instances of the software to sign an installer, which “disrupted the whole RMM [remote monitoring and management] ecosystem significantly.”

“So rather than everybody trying to create their own certificate, we can have this kind of secret little signing-as-a-service process,” he said. “Not only was the MSI [Microsoft Installer] signed, but it would also go out and replace all the component files and re-sign them as well. The whole thing was thought out pretty well.” 

Another thing that jumped out to Villadsen was the way in which the hackers seemed to not just be working to steal cargo but also to carry out “broader financial targeting and theft.”

They scanned for cryptocurrency wallets and manually checked for PayPal credentials. A PowerShell script on the infected device scanned for access points to financial institutions, money transfer services and online accounting platforms. It also searched for load management and freight brokerage platforms, as well as fuel card providers.  

“They know the transportation industry really, really well for sure, and know how to target that particular space,” he said. “But they're also cybercriminals, and they're looking for any way that they can monetize a workstation that they've landed on.” 

While this threat group is one of the most prolific at infiltrating load boards to deliver payloads, it is one of many cashing in on a vulnerable space. Villadsen says he and his team are tracking about a dozen different groups targeting the sector in North America and in Europe. 

With the vast majority of carriers being small enterprises with fewer than 10 trucks, they may not have robust cybersecurity defenses. By targeting them through load boards, hackers can infiltrate dozens or even hundreds of carriers at a time. 

“It’s an industry that unfortunately presents itself well to cyber intrusions and being able to escalate or scale the theft really well,” he said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

James Reddick

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.


文章来源: https://therecord.media/cargo-thieving-hackers-running-sophisticated-campaigns
如有侵权请联系:admin#unsafe.sh